Secure Authentication Protocol to Detect Sybil Attacks in MANETs
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 6
Abstract
Mobile ad-hoc networks (MANETs) are well known to be susceptible to various attacks, due to features such as lack of centralized control, dynamic topology, limited physical security and energy constrained operations. In this paper, we focus on preventing Sybil attack and Intruder nodes (malicious node). We are presenting a novel and secure authentication of nodes as soon as they comes in to the network (checks the identity of a new node) and then checking the RSS value of node continuously and accurately detecting the sybil identity in the network.
Authors and Affiliations
Nidhi Joshi , Prof. Manoj Challa
Design & Evaluation For Conversion from Dv to Mpeg4 Video in Grid Environment
The term, grid computing, has become one of the latest buzz words in the IT industry Grid computing is an innovative approach that leverages existing IT infrastructure to optimize computer resources and manage data and c...
Hybrid Reconfigurable FPGA Architecture Based on Autonomous Fine-Grain Power- Gating
Field Programmable Gate Arrays (FPGAs) are special type processor which allows the end user to configure directly. This paper investigates to design a low power reconfigurable Asynchronous FPGA cells. The proposed design...
Energy Efficient Routing Protocols for MANETs: A Survey
MANET (Mobile Ad hoc Network) is a type of ad hoc network that can change location and configure itself arbitrarily. MANET is a wireless infrastructure less network environment. The nodes or devices are moves independent...
One Dominant Graph Topology for Heterogeneous Wireless Sensor Networks
The integration of different wired and wireless access technologies constitute the nextgeneration heterogeneous network. A typical wireless sensor network configuration consists of sensors sensing and transmitting their...
DETERMINING OPTIMIZED LEARNING PATH FOR AN ELEARNING SYSTEM USING ANT COLONY OPTIMIZATION ALGORITHM
This paper analyzes the optimized learning path based on the behavior of student’s pattern by applying ant colony optimization algorithm in e-learning application. The behavior of pattern is analyzed based on the behavio...